• Nenhum resultado encontrado

[PDF] Top 20 Verification of vehicular networks using probabilistic model checking

Has 10000 "Verification of vehicular networks using probabilistic model checking" found on our website. Below are the top 20 most common "Verification of vehicular networks using probabilistic model checking".

Verification of vehicular networks using probabilistic model checking

Verification of vehicular networks using probabilistic model checking

... to vehicular traffic ...Specifications of APIs for coupling traffic flow and networking simulators (2) Modeling how drivers react to the additional information provided by VANETs (3) Benchmark definitions ... See full document

183

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... number of received ...value of the counter is less than a predefined threshold within a period of Random Assessment Delay (RAD) ...like Vehicular Ad hoc Networks VANETs. Recently, the ... See full document

11

Model Checking the Biological Model of Membrane Computing with Probabilistic Symbolic Model Checker by Using Two Biological Systems

Model Checking the Biological Model of Membrane Computing with Probabilistic Symbolic Model Checker by Using Two Biological Systems

... models. Model checking could be used to reason about the biological system in detail and with precision by verifying formally whether membrane computing model meets the properties of the ... See full document

10

Probabilistic and Hybrid Model Checking Deployments for
Wireless Sensor Networks

Probabilistic and Hybrid Model Checking Deployments for Wireless Sensor Networks

... PRISM model checker is specific to analyze DTM (Discrete and Continuous-Time Markov Chains) and CTMC MDP (Markov Decision processes) and their extensions via ...PRISM model consists of a set ... See full document

12

Model Checking in Bits and Pieces

Model Checking in Bits and Pieces

... program verification are based on two fundamental concepts: that of inductive invariance and ...set of reachable states. The standard model checking strategy – without abstraction – is ... See full document

13

Probabilistic Artificial Neural Network For Recognizing the Arabic Hand Written Characters

Probabilistic Artificial Neural Network For Recognizing the Arabic Hand Written Characters

... plurality of settings is automated recognition of textual ...set of the machine printed/hand written characters is intended to ...task of recognized characters can be broadly separated into ... See full document

6

Verification of a coupled atmosphere-ocean model using satellite observations over the Adriatic Sea

Verification of a coupled atmosphere-ocean model using satellite observations over the Adriatic Sea

... each of the forecasts does not increase with ...beginning of the forecast period and it decreases as time goes ...number of grid points for which satellite observations were available, (19 January; ... See full document

20

Modeling of Two-Stage Solidification: Part II Computational Verification of the Model

Modeling of Two-Stage Solidification: Part II Computational Verification of the Model

... stage of solidification is the same for both modified and unmodified ...stage of the solidification, the nucleation process unfolds in slightly different way, depending on the eutectic transformation ... See full document

6

Secure Clustering in Vehicular Ad Hoc Networks

Secure Clustering in Vehicular Ad Hoc Networks

... record of each trusted node would be maintained along with its public ...each of which was responsible for its own geographical ...level of trust of each node and then moved that node to get ... See full document

7

Content delivery in vehicular ad hoc networks

Content delivery in vehicular ad hoc networks

... number of vehicles in the roads, and makes such information available to ...objective of this application is to provide traffic information to ...area of relevance to vehicles in ...occurrence ... See full document

143

Transmission network expansion planning based on hybridization model of neural networks and harmony search algorithm

Transmission network expansion planning based on hybridization model of neural networks and harmony search algorithm

... TNEP model and the proposed method for solving it was implemented in MATLAB software and the TNEP algorithm was applied to the Garver's 6-bus network, shown in ...characteristics of the transmission lines ... See full document

10

REDES SOCIAIS PARA CONFIANÇA EM REDES VEICULARES TOLERANTES A INTERRUPÇÕES

REDES SOCIAIS PARA CONFIANÇA EM REDES VEICULARES TOLERANTES A INTERRUPÇÕES

... Redes veiculares tolerantes a interrupções são redes ad hoc móveis em que a comunicação pode sofrer longas interrupções, são formadas por motoristas em busca de informações. Em regiões urbanas ou rodovias, geralmente não ... See full document

173

DTN Routing Protocols for VANETs: Issues and Approaches

DTN Routing Protocols for VANETs: Issues and Approaches

... Protocol using History of Encounters and Transitivity), a single copy history-based routing algorithm for ...A probabilistic metric called delivery predictability estimates the probability that node ... See full document

5

Performance of management solutions and cooperation approaches for vehicular delay-tolerant networks

Performance of management solutions and cooperation approaches for vehicular delay-tolerant networks

... operation of the ...the Vehicular Trust Model (VTM) to inform neighbors about the trustworthiness of a ...advantages of the unique characteristics of VDTNs to gather real time ... See full document

195

Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks

Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks

... A Vehicular Ad-Hoc Network is a technology that uses moving vehicles as nodes in a network to create a random node movement ...meters of each other to connect and in turn create a network with a wide ...out ... See full document

7

Vertical handover in vehicular ad-hoc networks - a survey

Vertical handover in vehicular ad-hoc networks - a survey

... Quality of service ...for Vehicular Ad-hoc Networks, it is essential to study the existing VHO ...study of existing mechanisms will assist in the identification of important parameters ... See full document

7

Signal Persistence Checking of Asynchronous System Implementation using SPIN

Signal Persistence Checking of Asynchronous System Implementation using SPIN

... esign of asynchronous system is widely used in various real time ...controls of the hardware ...constructed of modular hardware ...implemented using asynchronous circuits. Therefore, the ... See full document

6

An Advanced Certain Trust Model Using Fuzzy  Logic and Probabilistic Logic theory

An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory

... truth of the ...wish of the developer. E.g. One developer wants to scale the rating of his product from 1 to 5, means 1 is the lowest rate of the product and 5 is the highest ...type of ... See full document

10

Verification of symmetric models using semiautomatic abstractions

Verification of symmetric models using semiautomatic abstractions

... use of abstractions is considered one of the most general and ...adoption of abstractions consists of generating a reduced model from the original model by merging or removing ... See full document

88

Bounded Model Checking de programas imperativos

Bounded Model Checking de programas imperativos

... em Model Checking ...Bounded Model Checking (BMC) ´ e uma t´ ecnica de MC que restringe a explora¸ c˜ ao do espa¸ co de estados at´ e um determinado comprimento (bound ) dos tra¸ cos de execu¸ ... See full document

101

Show all 10000 documents...